We changed our name from IT Central Station: Here's why
2021-07-01T18:07:19Z

What is your primary use case for Check Point Full Disk Encryption Software Blade?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
33 Answers

author avatar
Top 10Real User

We use Check Point Full Disk Encryption Software Blade as anti-virus and anti-malware protection on our endpoints. This solution is available as an enterprise bundle, which we use on all of our endpoints.

2021-10-19T18:20:51Z
author avatar
Top 20Real User

We are using the most up-to-date version, software blades 82 through 85. We use the solution for endpoint encryption and it handles everything. There's security, a firewall within the workstation and DLP within the solution and on the workstation. It makes use of 360-degree security on one's workstation.

2021-08-19T21:26:28Z
author avatar
Top 20Real User

The solution is primarily for the endpoint as a firewall-type Blade. We implement several different Blades.

2021-07-01T18:07:19Z
Find out what your peers are saying about Check Point, Microsoft, WinMagic and others in Endpoint Encryption. Updated: January 2022.
564,322 professionals have used our research since 2012.